首页> 外文期刊>ACM transactions on computer systems >Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems
【24h】

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems

机译:在可扩展系统中分离访问控制策略,实施和功能

获取原文
获取原文并翻译 | 示例
           

摘要

Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Extensions closely interact through low-latency but type-safe interfaces to form a tightly integrated system. As extensions can come from arbitrary sources, not all of whom can be trusted to conform to an organization's security policy, such structuring raises the question of how security constraints are enforced in an extensible system.
机译:诸如Java或SPIN可扩展操作系统之类的可扩展系统允许以几乎任意的方式将代码单元或扩展添加到正在运行的系统中。扩展通过低延迟但类型安全的接口紧密交互,以形成紧密集成的系统。由于扩展可以来自任意来源,并非所有人都可以信任扩展以符合组织的安全策略,因此这种结构提出了一个问题,即如何在可扩展系统中实施安全约束。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号